
Browser Isolation: Running a browser as another user
The notion of separating the user context from the browser (and possibly the email client) is not new;...

A Beginners Guide to CPEs (the easy way)
Many security professionals attain certifications because it proves their capabilities and the letters look nice – especially to...

The Failure of FTX
Blockchain this, Bitcoin that. Since 2010, the world has gone crazy about distributed ledger currencies and assets, much...

Under Pressure; ohnoesivebeenhacked 🤣
A very important email arrived in my mail account – marked as spam by Gmail. Maybe it is...

Information Technology 1.0: The risks that stick with us
If we look at Information Technology generations, I would say we are presently in Information Technology 4.0 and...

Hyper-V, sounds like Free
After running for years with the free Oracle VM VirtualBox, I branched into using Hyper-V as it offers...

Solving the BSOD on a Microsoft Surface Pro 7, Part 2
Because Part 1 did not solve it! It’s been years since the BSODs started on my Surface. It...

EvilProxy – Phishing as a Service
EvilProxy has just hit the news; it’s nothing so new but has been commercialised which means that phishing...

Solving the BSOD on a Microsoft Surface Pro 7
I’ve been the happy owner of a Microsoft Surface Pro 7 for 3 years now and, due to...

Just Enough Security to Perform
Living near a lake where people can go and sunbathe is nice, especially in the summer. At my...